Drop-in Mode for Easy Multi-WAN
In an April 6, 2018 article on National Public Radio’s website, the writer, Vanessa Romo never references the soon to be implemented GDPR in Europe. She believes Facebook COO Sanberg’s promise that if they find more examples of data collected by Facebook getting into the wrong hands, they will notify the public. She accepts Sandberg’s apology that Facebook “didn’t do enough” to protect their user’s privacy. The writer seems comfortable with Facebook holding “a massive trove of user data.” With all due respect, Ms. Romo is asking all the wrong questions.
Social Engineering Exploits Human Trust and Courtesy to Gain Unauthorized Access
When we talk about security everyone thinks about firewalls and brute force attacks, but most IT administrators have things pretty well locked down on the server side. Some of the recent headline attacks were because of people, not systems. Investigators traced the now famous Hilary Clinton email leak to a hack of John Podesta’s Gmail account, a result of him clicking on a fake Google security alert in a spear-phishing attack. Back-end security will not help when an employee at a work computer clicks a fraudulent link in Facebook, bringing ransomware in the virtual front door. The easiest way into your private information is probably through your employees.
This post is Part 2, please see: Industrial Internet of Things for Part 1.
The infusion of Internet protocol professionals into Industrial Machine communications has presented a new alphabet soup of acronyms and terms. Even some seasoned IT professionals are left scratching their heads when presented with the closed systems that have existed for years in industrial machine to machine communications.
At a Peplink Summit, Josh Varghese of Traceroute gave a presentation on IIoT, the Industrial Internet of Things. His talk included a basic description of Industrial IoT, a simple but essential clarification of Operational Technology—the core of IIoT, and an important glossary of terms. For the sake of this blog, I will split Mr. Varghese’s detailed talk into two parts. This first part will focus on the difference between IT (Information Technology) and OT (Operational Technology.)
On January 22, 2018, FrontierUS and Peplink hosted the first North American Partner Summit in San Antonio, Texas. The event was an opportunity for Peplink resellers from Canada, Mexico, and the United States to meet and discuss future technology with Peplink Engineers and staff.
As of May 2017, More than 50% of US households no longer have a wired landline phone. They rely on cellular phones only. Although the percentage is smaller, a significant number of business also have no landlines and use only cell phones. Many technicians, field reps, sales staff, and other personnel in large businesses have only a cell phone for voice communication. Some of these workers exclusively use a cellular connection for personal or business data communications as well. And yet, cell connections are not always reliable.
Last week, on Amazon, I bought a toothbrush kit for my dog Bissell. I bought it from home using a Galaxy Tab S2. Now, one week later, everywhere I go, on any device, I see ads for dog toothbrushes, even at work on my Windows PC. While I personally brush my teeth a few times a day, brushing beagle teeth is a twice a week proposition at best. I am not sure how many toothbrushes most dogs need, but I’m pretty sure one will cover us for a while. My dark side tempts me to click on some of those ads so the vendors serving them up will have to pay for their foolishness, but being petty takes time that I don’t want to waste.